Assessing UAV Survivability

An oft-cited draw-back of unmanned air systems is their vulnerability to a variety of threats both physical, such as anti-aircraft fire, and electronic, including jamming. Researchers and industry are beginning to more seriously examine these threats as the number of drones operating proliferates.

How do UAVs stack up against these various threats, especially in the maritime environment?

On the physical front, depending on at what altitude they are operating, maritime UAVs face similar threats to helicopters and patrol aircraft. Small tactical UAS flying surveillance missions at relatively low altitudes over land or water are vulnerable to the simplest anti-aircraft threat, small arms fire. In 2011, a Fire Scout UAV operating from USS Halyburton (FFG 40) over Libya was shot down by some sort of ground fire. While flying over-water, drones might face close-in-weapons systems ranging from 20-30mm to larger naval guns in the 57mm-to-155mm range. Recently, Naval Post Graduate School (NPS) Systems Engineering – Test Pilot School Co-Op students Lieutenants Jacob King and Jared Wolcott completed research on ScanEagle survivability against small arms. Their analysis shows that the overall probability of kill (pk) in a given scenario may exceed 50% against a 12.7mm (.50 caliber) weapon, and that the greatest driving factor in the UAV’s survivability is its slant range to the threat. They recommend upgrades to optics modules to allow the aircraft to operate at higher altitudes which will reduce the probability of detection, increase aiming error and ballistic dispersion, and possibly eliminate small-arms threats altogether by flying above and outside enemy weapons range. Future low-altitude maritime UAS will also be vulnerable to shoot-down from directed energy weapons, such as the laser system which will deploy onboard USS Ponce (AFSB(I) 15) later this summer.

Moving up the spectrum of vulnerabilities, there are several publically released incidents which provide anecdotal evidence on combat losses of UAVs from surface-to-air missiles and manned aircraft. In August 1995, a Predator was shot down over Bosnia. Another Pred was shot down over Kosovo in May 1999 by a 1960s-era Soviet Strela surface-to-air missile. An Iraqi Mig-25 downed another MQ-1 over Iraq on December 23, 2002. The Air Force equipped some Predators with Stinger air-to-air missiles in 2002, but had little success countering the Iraqi air threat. In 2012, Iranian SU-25s tried unsuccessfully to shoot down U.S. Predators over the Arabian Gulf. Also in 2012, Israeli F-16s shot down an Iranian tactical UAV over Israeli territory, then did so again off the coast of Haifa in April 2013. Against modern naval SAMs, lower, slower-flying UAVs would likely be highly vulnerable.

There is little reason that compact chaff and flare systems could not be integrated onto most medium- and large-size UAS platforms to offer them some passive protection from these threats. Perhaps the highest-end protective system against shoulder-launched surface-to-air missiles is the Directional Infrared Countermeasures (DIRCM), which has been fitted on a variety of U.S. fixed- and rotary-wing aircraft. DIRCM detects, tracks, and jams infra-red guided missiles using a FLIR and laser. Raytheon’s Common Infrared Counter-Measures (CIRCM) is designed to be lightweight enough for large UAS platforms. Higher-end UAVs, such as the X-47B, feature infrared and radar signature reduction characteristics, though these measures are not cost-effective on tactical UAVs.

Jamming, spoofing, and environments where communications links and even GPS navigation are jammed are an emerging threat to UAVs. On 4 December 2011, Iran’s cyber warfare unit allegedly brought down a U.S. RQ-170 surveillance UAV in some sort of controlled manner. Enhancing autonomy is one way to add resiliency to UAS operating in an electromagnetically-contested environment. Boeing performed some interesting work on bio-inspired autonomy with ScanEagles, one of the most numerous UAVs operating at sea today. The goal of this experimentation was for the UAVs operating in a swarm of vehicles to form a beyond line of site (BLOS) relay network. In addition to relaying UAV surveillance data and telemetry over-the-horizon without the use of satellite communications, the project demonstrated the ability of a ScanEagle to fly autonomously through a jammed environment, then exfiltrate the data collected via the BLOS relay once it exited the denied area. Read more here on UAV communications relays.

One primary desirable attribute of unmanned aircraft, especially smaller, less expensive types, is that combat losses are much more acceptable than with manned aircraft. Though as the NPS study notes, “the loss of a small UAV does not incur any loss of life or a large cost, the potential loss of the ISR mission it performs is becoming increasingly important to the combatant commanders. The survivability discipline must be applied to UAVs to ensure that these assets become more survivable and can complete their assigned missions in a higher threat environment.”

This article was re-posted by permission from, and appeared in its original form at NavalDrones.com.

Our New Partners

The beaches at Norrmandy
              The wind farms at Norrmandy, France

We here at CIMSEC are always looking for new partners to help keep you abreast of the maritime world from the various bits of the world. You’ll see our current partners over on the right-hand side under “Partners Sites.” Our newest comrades come from just across “the pond” over in the UK and France.

The first is ThinkDefense, a non-partisan U.K. website much like ours, which aims to encourage debate, writing, and analysis among writers of various outlooks and bring the best of it to you. Did you know that the Royal Navy has its sights set on a leap forward in replenishment-at-sea capabilities, that there are no real “tall ships” for training in the Royal Navy, or, less seriously, which British ship plays the U.N. command ship USS Argus in the upcoming movie World War Z?

The second is the blog of the prolific French reporter Philippe Chapleau, “Lignes de Défense” or “Lines of Defense”. He provides an excellent mix of analysis on a variety of defense issues from front-line warfare to homefront anecdotes. For example, did you know that the Cherbourg Naval Base celebrated its 200th anniversary this past weekend, that a controversial wind turbine project is going up off of the beaches of Normandy, or that you can sign a petition to register the beaches as a UNESCO World Heritage Site? Did you know what NATO exercise just concluded on the French frigate Aconite or that American company AdvanFort as a greater counter-piracy presence off Somalia than the more widely publicized British group Typhon? Well if you did, you’re smarter than me (admittedly not the greatest measure of intelligence), but we’re happy to plug into ThinkDefence’s and Philippe’s knowledge and help bring it to you.

Putting the Human in Information Dominance

Where would Col John Boyd locate tactical information synthesis?
Where would Col John Boyd locate tactical information synthesis?

Building on the concepts of Col John Boyd1, the U.S. Navy’s Navy Doctrine Publication (NDP) 6, Naval Command and Control describes the decision-making process as a recurring cycle of observe-orient-decide-act (OODA). A human decision maker that can process this cycle quickly, observing and reacting to unfolding events more rapidly than an opponent, can thereby get inside the opponent’s decision cycle and gain the advantage.

As Boyd noted: “Machines don’t fight wars. Terrain doesn’t fight wars. Humans fight wars. You must get into the mind of humans. That’s where the battles are won.”2

According to NDP-6 the humans that make command decisions at the tactical level are the Composite Warfare Commander (CWC) and his/her principal warfare commanders. The Composite Warfare Commander is the central command authority and overall commander. Under the CWC architecture, the Officer in Tactical Command (OTC) delegates command authority in particular warfare areas to subordinate commanders within the CWC organization including: Sea Combat Commander (SCC), Surface Warfare Commander (SUWC), Undersea Warfare Commander (USWC), Air Warfare Commander (AWC), Information Warfare Commander (IWC), Strike Warfare Commander (STWC), and Mine Warfare Commander (MIWC). To dominate in combat, information has to be integrated, presented to, and easily understood by these humans.

This integration of combat information3 has to occur once and, from all indications, onboard ship in order to realize the advantage of superior information and gain the decision/time advantage. When not in EMCON, this knowledge in the mind of the commander is derived primarily from combat information from tactical unit/force (aka “organic”) sensor systems and, to a lesser degree from sensor systems external to the force. The reverse is the case when operating in EMCON. The integration of combat information from external active and passive sensor systems with information from a tactical force’s passive sensor systems dramatically increases the potential for continued information superiority and tactical advantage.

The Navy Strategy for Information Dominance 2013-2027 contains Objective 3.3: “Integrate all-source information across kill chains”. It states: “Disparate information sources will necessarily span physical locations, security classifications and Navy warfighting domains, but they must be synthesized4 to create actionable knowledge.”  The Strategy doesn’t indicate where this integration will occur, or whether sensor information from tactical-force sensors will be included.  If integration of only external sensor information, the resulting product would at best be incomplete, at worst misleading, delivered late to the tactical user; and, in a form not suitable for further integration (de-correlation/re-correlation) with information from tactical sensors.  If the concept is for organic sensor information to be communicated to some rear area facility for integration with external sensor information and disseminated back to the fleet then there are multiple negative implications. These include communications loading and vulnerabilities, OPSEC considerations, and especially time delays. If presented with two or more separate “pictures of the situation” based on the integration of different sets of information, tactical commanders will still have to mentally synthesize multiple situation awareness inputs – a recipe for misinterpretation, delay and loss of tactical advantage.

As stated in the Strategy:“The Information Dominance pillar can be our most powerful asset, or it can be our greatest liability. If we integrate it intelligently, and if we execute it correctly, we will be able to seize the operational initiative, gain tactical advantage, and win future battles with overwhelming speed.”  The “we” has to include not only the Information Dominance Corps, but also the Surface Warfare community and the requirements and acquisitions organizations charged with getting combat systems on surface ships right.

To paraphrase Boyd: Information doesn’t fight wars. Humans fight wars. Information must get into the mind of humans. That’s where dominance occurs and battles are won.

Dick Mosier is a recently retired defense contractor systems engineer; Naval Flight Officer; OPNAV N2 civilian analyst; SES 4 responsible for oversight of tactical intelligence systems and leadership of major defense analyses on UAVs, Signals Intelligence, and C4ISR.  His interest is in improving the effectiveness of U.S. Navy tactical operations, with a particular focus on organizational seams, a particularly lucrative venue for the identification of long-standing issues and dramatic improvement. The article represents the author’s views and is not necessarily the position of the Department of Defense or the United States Navy. 

1. The OODA Loop was developed by Col John R. Boyd, USAF (Ret), An Organic Design for Command and Control, A Discourse on Winning and Losing. Unpublished lecture notes, August 1987.

2. John Boyd, quoted by Henry Eason, “New Theory Shoots Down Old War Ideas,” Atlanta Constitution, March 22, 1981

3. Joint Pub 2-01: “Combat information: Unevaluated data, gathered by or provided directly to the tactical commander which, due to its highly perishable nature or the criticality of the situation, cannot be processed into tactical intelligence in time to satisfy the user’s tactical intelligence requirements.”

4. Joint Pub 1-02: “Synthesis: In intelligence usage, the examining and combining of processed information with other information and intelligence for final interpretation.”

Thinking About Prevention, Pt. 3

Musicians from the military bands of China's People's Liberation Army and the U.S. Army take photos during a rehearsal for their joint concert in Beijing in this file photo
“So now that we’re Facebook friends we’re all good, right?”

Last summer I wrote two short pieces (Part 1 here; Part 2 here) about preventing conflict between the U.S. and China in the Pacific, or reeling it in should it occur. In the posts I explained why U.S.-Chinese economic interdependence is not enough in itself to prevent the potential start of a conflict that could escalate with disastrous global consequences, or MEOW (Mutual Economic Obliteration – Worldwide).

I noted that the U.S. can take further steps to decrease the likelihood of conflict, and to bolster mechanisms for inhibiting escalating crises – either by sowing respect (often involving means/military capabilities useful in the event prevention fails) or by building “habits of cooperation”.

In part 3 of this series I had intended to lay out a model that could address the need for the second of these lines of effort, by expanded cooperation between the U.S. and Chinese militaries through humanitarian assistance / disaster response (HA/DR) exercises. Clearly, I put off writing too long.

The first thing that has changed is that LCDR Jason Grower called for a very similar approach in April’s Proceedings. I highly recommend reading Jason’s article in its entirety, but in what follows I will outline some of his more important points and highlight where my own thinking differs or builds upon his framework.  I will also note where recent developments hold promise of expanded cooperation. Let’s first recap why the U.S. should make the effort.

The Need

In the spring of 2012, my U.S. Naval War College class was split into two teams and told to identify a danger facing the U.S. in the Pacific and develop a plan to mitigate it. Team one took the more “traditional” route, identifying China’s growing military capabilities.  Team two looked at the potential second-order perils of regime collapse in North Korea. These hazards included possible blind ‘encounter’ contact between ROK (and/or U.S.) and Chinese forces as they move into to the North to stem refugee flows, secure WMDs, and attempt to stabilize the country.1 More significant than the dangers identified was the fact that the recommended mitigation action – regular HA/DR exercises with China – was roughly the same for both developments, and that both teams arrived at their solution set by following a similar logic.

PreventionWhile much attention has been given to the importance of deterring through strength (“sowing respect”), this primarily prevents conflicts of policy in the event decision makers in Beijing seek to achieve political goals “through other means.” Despite MEOW this is not an impossible scenario, especially in the event of internal power struggles or a PRC regime on the ropes. However, both teams felt that it more likely a conflict would begin out of misunderstanding, mistakes, or the misbehavior of a rogue command or commander – whether in the seas surrounding China or on the Korean Peninsula. Since such an incident would not be prevented through the normal means of MEOW or sowing respect, we therefore turned to the HA/DR exercises as efforts towards building “habits of cooperation,” thought not only “vital to diffusing those instances when misunderstanding and accidents lead to a stand-off with few face-saving options”, but also helpful in de-escalating those conflicts sprung from a different causus belli.

In his article, Jason explains the need for the exercises in several ways. Echoing the focus on building “habits of cooperation”, he states one of the primary purposes of such an HA/DR exercise would be to “heighten understanding between the two militaries and promote stable military-to-military relations.” Further, he believes it would provide an opportunity to “bolster broader U.S.-Chinese ties” and even internal Chinese military-civilian ties.

Such ties help the transformation in relationship from what conflict theorist Johan Galtung calls a ‘negative peace’, in which there is no direct violence, to a ‘positive peace’, in which an attitude shift has allowed the development of a cooperative partnership. Yet it’s important to remember that these ties are just one leg of the prevention triad – even the ties of the Union, where future foes sat side-by-side in the same military academies, could not prevent the U.S. Civil War once policy makers had settled on violence.

To his credit, Jason also looks beyond the strategic implications and discusses the direct impact a Sino-American HA/DR exercise on the affected people in the region, by increasing the “global ability to respond to disasters in the Pacific”. Familiarity between U.S. and Chinese counterparts of each other’s capabilities/standard operating procedures in HA/DR operations is particularly important, as their maritime forces are likely to work elbow-to-elbow in same operational spaces of future calamities – whether Korea or Borneo, and coordination can boost the efficacy of the response. After all, as Jason notes, “to the person whose home was decimated and needs medical care quickly, it makes no difference whether the doctors are Chinese, American, or otherwise.”

The Plan

So how would such an exercise look? I had the chance to sit down with Jason two weeks ago over the Pentagon’s finest lunch option (Peruvian chicken!) and we discussed the concept. We agreed that a “conference”, as advocated as the first step in his article, was necessary but pro forma as part of the build-up to a larger exercise or operation, typically referred to as a planning conference.

Hoping for Habit-Forming
                             Habit-forming

The first question really is whether to tailor it as an operation, an exercise, or both. Both nations already run their own HA operations – China aboard its Peace Ark, and the U.S. with its annual Pacific Partnership operation – performing medical procedures and building health and first-responder partnership capacities. Pacific Partnership this year is co-led by Australia and New Zealand in addition to the U.S., a set-up that demonstrates scalability, an important attribute given the propensity of China to make its participation contingent upon politically sensitive outcomes (arms sales to Taiwan, meetings with the Dalai Lama). In other words the operation can go on without China if necessary. Further, it allows both the U.S. and China to claim equal leadership, and, if conducted with vessels from each nation, should assuage the moral concerns and intelligence-gathering fears of partners and participating NGOs who might hesitate to join in an operation with China.

Nonetheless, in pursuit of building habits of cooperation2 I believe the U.S. and China would get the most bang for their (fiscally constrained) bucks and yuan through a combined large-scale DR exercise. This could be a capstone event at the tail-end of Pacific Partnership that expands involvement for interested nations and focuses on responding to likely disaster contingencies in the region. While China too recently identified HA/DR as promising common ground for expanded U.S.-China military relations3, it’s a sentiment they’ve expressed in the past and one that has not always borne out. Encouragingly, both the U.S. and China are participating in next month’s ASEAN-led disaster response exercise (ADMM-Plus)4, although the degree of participation and interaction between the two nations is not yet clear.

Still there are additional signs of burgeoning ties, including China’s invitation in January to send for the first time a ship to participate to the 2014 Rim of the Pacific (RIMPAC) naval exercise. Prevention requires more of this. And if China really wanted to show its displeasure with North Korea’s nuclear tests, what better way to do so than participating in a joint HA/DR exercise that either implicitly or explicitly prepared for a post-DPRK Korea?

Scott is a former active duty U.S. Navy Surface Warfare Officer, and the former editor of Surface Warfare magazine. He now serves as an officer in the Navy Reserve and civilian writer/editor at the Pentagon. Scott is a graduate of Georgetown University and the U.S. Naval War College.

Note: The views expressed above are solely those of the authors and do not necessarily represent those of their governments, militaries, or the Center for International Maritime Security.

1. One solution would be a pre-arranged agreement allowing only ROK troops to move north, or U.S. personnel on a solely humanitarian mission. 
2. As well as planning for a post-DPRK Korean Peninsula.
3. And is one of the few areas of military exchange not prohibited by U.S. law.
4. And perhaps just as importantly, Japan

Fostering the Discussion on Securing the Seas.